SSA-625934

Vulnerability from csaf_siemens - Published: 2026-02-10 00:00 - Updated: 2026-02-10 00:00
Summary
SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers

Notes

Summary
The Webhooks implementation of Siveillance Video Management Servers contains a vulnerability that could allow an authenticated remote attacker with read-only privileges to achieve full access to Webhooks API. Siemens has released new versions for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "The Webhooks implementation of Siveillance Video Management Servers contains a vulnerability that could allow an authenticated remote attacker with read-only privileges to achieve full access to Webhooks API.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure Siemens strongly recommends to protect network access to affected products with appropriate mechanisms. It is advised to follow recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-625934.html"
      },
      {
        "category": "self",
        "summary": "SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-625934.json"
      }
    ],
    "title": "SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers",
    "tracking": {
      "current_release_date": "2026-02-10T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-625934",
      "initial_release_date": "2026-02-10T00:00:00Z",
      "revision_history": [
        {
          "date": "2026-02-10T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "interim",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "Siveillance Video V2022 R3",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "Siveillance Video V2022 R3"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V23.1 HotfixRev18",
                "product": {
                  "name": "Siveillance Video V2023 R1",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "Siveillance Video V2023 R1"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V23.2 HotfixRev18",
                "product": {
                  "name": "Siveillance Video V2023 R2",
                  "product_id": "3"
                }
              }
            ],
            "category": "product_name",
            "name": "Siveillance Video V2023 R2"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V23.3 HotfixRev23",
                "product": {
                  "name": "Siveillance Video V2023 R3",
                  "product_id": "4"
                }
              }
            ],
            "category": "product_name",
            "name": "Siveillance Video V2023 R3"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V24.1 HotfixRev14",
                "product": {
                  "name": "Siveillance Video V2024 R1",
                  "product_id": "5"
                }
              }
            ],
            "category": "product_name",
            "name": "Siveillance Video V2024 R1"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "All versions \u003c V25.1 HotfixRev8",
                "product": {
                  "name": "Siveillance Video V2025",
                  "product_id": "6"
                }
              }
            ],
            "category": "product_name",
            "name": "Siveillance Video V2025"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-0836",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "1"
          ]
        }
      ],
      "notes": [
        {
          "category": "summary",
          "text": "Missing Authorization vulnerability in Milestone Systems XProtect VMS allows users with read-only access to Management Server to have full read/write access to MIP Webhooks API.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "2",
          "3",
          "4",
          "5",
          "6"
        ],
        "known_not_affected": [
          "1"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "If, for any reason it is not possible to install the latest patch, we recommend auditing  your role security settings and consider everyone with read-only access to the Management Server as having a full access to Webhooks configuration.",
          "product_ids": [
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V23.1 HotfixRev18 or later version",
          "product_ids": [
            "2"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109820659/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V23.2 HotfixRev18 or later version",
          "product_ids": [
            "3"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109823922/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V23.3 HotfixRev23 or later version",
          "product_ids": [
            "4"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109827783/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V24.1 HotfixRev14 or later version",
          "product_ids": [
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109976123/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V25.1 HotfixRev8 or later version",
          "product_ids": [
            "6"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109988670/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "2",
            "3",
            "4",
            "5",
            "6"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "The affected feature is not supported.",
          "product_ids": [
            "1"
          ]
        }
      ],
      "title": "CVE-2025-0836"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…